Module 1: Configure Your Microsoft 365 Tenant
• Configure your Microsoft 365 experience
• Manage users, licenses, and mail contacts in Microsoft 365
• Manage groups in Microsoft 365
• Add a custom domain in Microsoft 365
• Configure client connectivity to Microsoft 365
Lab 1: Microsoft 365 Tenant & User Management
• Initialize Microsoft 365 Tenant
• Manage Users and Groups
• Add a Domain
Module 2: Manage Your Microsoft 365 Tenant
• Configure administrative roles in Microsoft 365
• Manage tenant health and services in Microsoft 365
• Deploy Microsoft 365 Apps for enterprise
• Analyze your Microsoft 365 workplace data using Microsoft Viva Insights
Lab 2: Role Management & Monitoring
• Manage Roles and Role Groups
• Monitor Microsoft 365
• Microsoft 365 Apps
Module 3: Implement Identity Synchronization
• Explore identity synchronization
• Prepare for identity synchronization to Microsoft 365
• Implement directory synchronization tools
• Manage synchronized identities
• Manage secure user access in Microsoft 365
Lab 3: Identity Synchronization
• Prepare Identity Synchronization
• Implement Identity Synchronization
Module 4: Explore Security Metrics in Microsoft 365 Defender
• Examine threat vectors and data breaches
• Explore the Zero Trust security model
• Explore security solutions in Microsoft 365 Defender
• Examine Microsoft Secure Score
• Examine Privileged Identity Management
• Examine Azure Identity Protection
Lab 4: Secure User Access & Privileged Identity Management (PIM)
• Manage Secure User Access
• PIM - Admin Approval
• PIM - Self Approval
• PIM - Teammate Approval
Module 5: Manage Your Security Services in Microsoft 365 Defender
• Examine Exchange Online Protection
• Examine Microsoft Defender for Office 365
• Manage Safe Attachments
• Manage Safe Links
Lab 5: Email Security
• Safe Attachments
• Safe Links
Module 6: Implement Threat Protection by Using Microsoft 365 Defender
• Explore threat intelligence in Microsoft 365 Defender
• Implement app protection by using Microsoft Defender for Cloud Apps
• Implement endpoint protection by using Microsoft Defender for Endpoint
• Implement threat protection by using Microsoft Defender for Office 365
Lab 6: Security Alerts & Attack Simulations
• Prepare Alert Policies
• Mailbox Permission Alert
• SharePoint Permission Alert
• eDiscovery Alert
• Attack Simulation - Phishing Attack
• Attack Simulation - Password Attack
• Validate Alerts and Attacks
Module 7: Explore Data Governance in Microsoft 365
• Examine data governance solutions in Microsoft Purview
• Explore archiving and records management in Microsoft 365
• Explore retention in Microsoft 365
• Explore Microsoft Purview Message Encryption
Lab 7: Data Retention
Retention Policies
Module 8: Implement Compliance in Microsoft 365
• Explore compliance in Microsoft 365
• Implement Microsoft Purview Insider Risk Management
• Implement Microsoft Purview Implementation Barriers
• Explore Microsoft Purview Data Loss Prevention
• Implement Microsoft Purview Data Loss Prevention
Lab 8: Data Loss Prevention (DLP)
• Manage DLP Policies
• Test DLP Policy
Module 9: Manage Compliance in Microsoft 365
• Implement data classification of sensitive information
• Explore sensitivity labels
Lab 9: Sensitivity Labels
• Implement Sensitivity Labels